A Defense Approach of DAD Attack in Stateless Auto Configuration
In stateless address auto configuration, node needs to carry out duplicate address detection before using a new IP address. In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration will fail. For this case, WAY(who are you)...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2014-04-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.04.008/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529339887222784 |
---|---|
author | Guangjia Song Zhenzhou Ji Hui Wang |
author_facet | Guangjia Song Zhenzhou Ji Hui Wang |
author_sort | Guangjia Song |
collection | DOAJ |
description | In stateless address auto configuration, node needs to carry out duplicate address detection before using a new IP address. In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration will fail. For this case, WAY(who are you)mechanism as a defensive approach was proposed. WAY mechanism uses reverse address confirmation, self-declaration and WAY-table inspection to filter the spoofing packets, which make attackers' cost increase and cannot carry out secondary attack. The experiments show that WAY mechanism can effectively compensate the security flaws of neighbor discovery protocol, significantly increase the success rate of stateless address auto configuration. |
format | Article |
id | doaj-art-6d5765878828422eb75dad33e12cfb3a |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2014-04-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-6d5765878828422eb75dad33e12cfb3a2025-01-15T03:20:03ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-04-0130546059622258A Defense Approach of DAD Attack in Stateless Auto ConfigurationGuangjia SongZhenzhou JiHui WangIn stateless address auto configuration, node needs to carry out duplicate address detection before using a new IP address. In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration will fail. For this case, WAY(who are you)mechanism as a defensive approach was proposed. WAY mechanism uses reverse address confirmation, self-declaration and WAY-table inspection to filter the spoofing packets, which make attackers' cost increase and cannot carry out secondary attack. The experiments show that WAY mechanism can effectively compensate the security flaws of neighbor discovery protocol, significantly increase the success rate of stateless address auto configuration.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.04.008/network securityaddress resolutionIPv6stateless address auto configurationduplicate address detection |
spellingShingle | Guangjia Song Zhenzhou Ji Hui Wang A Defense Approach of DAD Attack in Stateless Auto Configuration Dianxin kexue network security address resolution IPv6 stateless address auto configuration duplicate address detection |
title | A Defense Approach of DAD Attack in Stateless Auto Configuration |
title_full | A Defense Approach of DAD Attack in Stateless Auto Configuration |
title_fullStr | A Defense Approach of DAD Attack in Stateless Auto Configuration |
title_full_unstemmed | A Defense Approach of DAD Attack in Stateless Auto Configuration |
title_short | A Defense Approach of DAD Attack in Stateless Auto Configuration |
title_sort | defense approach of dad attack in stateless auto configuration |
topic | network security address resolution IPv6 stateless address auto configuration duplicate address detection |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.04.008/ |
work_keys_str_mv | AT guangjiasong adefenseapproachofdadattackinstatelessautoconfiguration AT zhenzhouji adefenseapproachofdadattackinstatelessautoconfiguration AT huiwang adefenseapproachofdadattackinstatelessautoconfiguration AT guangjiasong defenseapproachofdadattackinstatelessautoconfiguration AT zhenzhouji defenseapproachofdadattackinstatelessautoconfiguration AT huiwang defenseapproachofdadattackinstatelessautoconfiguration |